CVE-2026-40318

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject path traversal sequences such as ../ into the id value to escape the intended directory and delete arbitrary .json files on the server, including global configuration files and workspace metadata. This issue has been fixed in version 3.6.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

History

20 Apr 2026, 16:50

Type Values Removed Values Added
First Time B3log
B3log siyuan
References () https://github.com/siyuan-note/siyuan/releases/tag/v3.6.4 - () https://github.com/siyuan-note/siyuan/releases/tag/v3.6.4 - Release Notes
References () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-vw86-c94w-v3x4 - () https://github.com/siyuan-note/siyuan/security/advisories/GHSA-vw86-c94w-v3x4 - Third Party Advisory
CPE cpe:2.3:a:b3log:siyuan:*:*:*:*:*:*:*:*

16 Apr 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-16 23:16

Updated : 2026-04-20 16:50


NVD link : CVE-2026-40318

Mitre link : CVE-2026-40318

CVE.ORG link : CVE-2026-40318


JSON object : View

Products Affected

b3log

  • siyuan
CWE
CWE-24

Path Traversal: '../filedir'